1. Lecture Notes in Computer Science;S.Z. Béguelin,2006
2. Bell, D.E., LaPadula, L.J.: Computer Security Model: Unified Exposition and Multics Interpretation. In: ESD–TR–75–306, The MITRE Corporation, Bedford, MA, HQ Electronic Systems Division, Hanscom AFB, MA (June 1975), http://csrc.nist.gov/publications/history/bell76.pdf
3. Biba, K.J.: Integrity Considerations for Secure Computer Systems. In: ESD–TR–76–372, The MITRE Corporation, Bedford, MA, HQ Electronic Systems Division, Hanscom AFB, MA (April 1977), http://handle.dtic.mil/100.2/ADA039324
4. Dennis, J.B., Van Horn, E.C.: Programming semantics for multiprogrammed computations. ACM Commun. 9(3), 143–155 (1966)
5. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. on Information Theory IT-22(6), 644–654 (1976)